A Review of Internet of Things in Healthcare

  • Alam M
N/ACitations
Citations of this article
88Readers
Mendeley users who have this article in their library.

Abstract

Internet of Things (IoT) rises as a powerful domain where embedded devices and sensors can connect and exchange information over the Internet. The importance of IoT devices and data can be critical, so security constraints are required to keep IoT data safe from intruders; authentication is one of basic and important means to confirm data privacy and security. The nature of IoT devices as a resource contains devices required a special authentication schema that does not consume high computing and energy resources. In this paper, a review for IoT healthcare usage and a novel authentication mechanism for IoT networks have been proposed. The architecture of reliable and secure healthcare architecture has been proposed. ECC algorithm over the CoAP protocol has been used. The proposed authentication approach provides an efficient authentication mechanism with high security.

Cite

CITATION STYLE

APA

Alam, Md. K. (2017). A Review of Internet of Things in Healthcare. IJARCCE, 6(3), 1–4. https://doi.org/10.17148/ijarcce.2017.6301

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free